Department of Business Information Technology
Permanent URI for this community
Browse
Browsing Department of Business Information Technology by Department "Business Information Technology"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
- Corporate crisis management on social media: A morality violations perspectiveZheng, Bowen; Bi, Gongbing; Liu, Hefu; Lowry, Paul Benjamin (2020-07)Communication via a social network function enabled by social media has greatly empowered consumers' secondary crisis communication, as compared to a firm's crisis communication, and has thus changed corporate crisis management. This study aims to uncover consumers' decision process of engaging in secondary crisis communication in a social media context. Drawing on the social control perspective and impression management theory,this study examines the role of perceived morality violations and consumers' susceptibility to social influence in shaping consumers' secondary crisis communication in corporate crises. Moreover, leveraging cognitive dissonance theory, this study further examines the effects of corporate responses on the process of consumers' secondary crisis communication. A survey design with four scenarios was conducted to test a series of hypotheses relating to the decision process of secondary crisis communication. Our empirical results demonstrate that consumers' approach to secondary crisis communication on social media depends largely to the degree to which they perceive moral violations in the firms' crisis response. The findings also show that consumers tend to want to believe they are doing the "right thing" when considering secondary crisis communication and thus are afraid of being disliked by others for their purchasing decisions related to a firm in crisis. Such social conformance can result in a snowballing of negative word of mouth in product-harm crises cases. Findings contribute to the literature on social media crisis management and consumers' communication behavior on social media during product-harm crises.
- Improving vulnerability remediation through better exploit predictionJacobs, Jay; Romanosky, Sasha; Adjerid, Idris; Baker, Wade (2020-09-14)Despite significant innovations in IT security products and research over the past 20 years, the information security field is still immature and struggling. Practitioners lack the ability to properly assess cyber risk, and decision-makers continue to be paralyzed by vulnerability scanners that overload their staff with mountains of scan results. In order to cope, firms prioritize vulnerability remediation using crude heuristics and limited data, though they are still too often breached by known vulnerabilities for which patches have existed for months or years. And so, the key challenge firms face is trying to identify a remediation strategy that best balances two competing forces. On one hand, it could attempt to patch all vulnerabilities on its network. While this would provide the greatest 'coverage' of vulnerabilities patched, it would inefficiently consume resources by fixing low-risk vulnerabilities. On the other hand, patching a few high-risk vulnerabilities would be highly 'efficient', but may leave the firm exposed to many other high-risk vulnerabilities. Using a large collection of multiple datasets together with machine learning techniques, we construct a series of vulnerability remediation strategies and compare how each perform in regard to trading off coverage and efficiency. We expand and improve upon the small body of literature that uses predictions of 'published exploits', by instead using 'exploits in the wild' as our outcome variable. We implement the machine learning models by classifying vulnerabilities according to high- and low-risk, where we consider high-risk vulnerabilities to be those that have been exploited in actual firm networks.
- Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessmentvan der Schyff, Karl; Flowerday, Stephen; Lowry, Paul Benjamin (Elsevier, 2020-08-01)The unauthorized use of personal information belonging to users of apps integrated with the Facebook platform affects millions of users. Crucially, although privacy concerns and awareness have increased, the use of these apps, and related privacy behaviors, remain largely unchanged. Given that such privacy behaviors are likely influenced by individuals' personality traits, it is imperative to better understand which personality traits make individuals more vulnerable to such unauthorized uses. We build on a recontextualized version of the theory of planned behavior (TPB) to evaluate the influence of the Big Five personality traits on attitudes toward Facebook privacy settings, social norms, and information privacy concerns (IPCs)—all within the context of Facebook app use. To evaluate this study's model, we analyzed 576 survey responses by way of partial least squares path modeling. Results indicate that highly extraverted individuals are particularly vulnerable to privacy violations (e.g., unauthorized use of personal information) because of their negative attitudes toward Facebook privacy settings. Our post hoc analysis uncovered interesting combinations of personality traits that make individuals particularly vulnerable to the unauthorized use of app-based information. In particular, the combination of extraversion and conscientiousness had a negative effect on individuals' attitude toward privacy settings. We also found a significant negative relationship between IPCs and intention to use Facebook apps. Finally, we found a positive relationship between social norms and intentions. Taken together, these results infer that individuals are likely to be influenced by their peers in the use of Facebook apps but that their intentions to use these apps declines as privacy concerns increase.
- The Relationship between Nurses’ Training and Perceptions of Electronic Documentation SystemsZaman, Nohel; Goldberg, David M.; Kelly, Stephanie; Russell, Roberta S.; Drye, Sherrie L. (MDPI, 2021-01-01)Electronic documentation systems have been widely implemented in the healthcare field. These systems have become a critical part of the nursing profession. This research examines how nurses’ general computer skills, training, and self-efficacy affect their perceptions of using these systems. A sample of 248 nurses was surveyed to examine their general computer skills, self-efficacy, and training in electronic documentation systems in nursing programs. We propose a model to investigate the extent to which nurses’ computer skills, self-efficacy, and training in electronic documentation influence perceptions of using electronic documentation systems in hospitals. The data supports a mediated model in which general computer skills, self-efficacy, and training influence perceived usefulness through perceived ease of use. The significance of these findings was confirmed through structural equation modeling. As the electronic documentation systems are customized for every organization, our findings suggest value in nurses receiving training to learn these specific systems in the workplace or during their internships. Doing so may improve patient outcomes by ensuring that nurses use the systems consistently and effectively.
- A Surrogate-based Generic Classifier for Chinese TV Series ReviewsMa, Yufeng; Xia, Long; Shen, Wenqi; Zhou, Mi; Fan, Weiguo (2016-11-21)With the emerging of various online video platforms like Youtube, Youku and LeTV, online TV series' reviews become more and more important both for viewers and producers. Customers rely heavily on these reviews before selecting TV series, while producers use them to improve the quality. As a result, automatically classifying reviews according to different requirements evolves as a popular research topic and is essential in our daily life. In this paper, we focused on reviews of hot TV series in China and successfully trained generic classifiers based on eight predefined categories. The experimental results showed promising performance and effectiveness of its generalization to different TV series.
- System and method for heterogenous spectrum sharing between commercial cellular operators and legacy incumbent users in wireless networks(United States Patent and Trademark Office, 2016-12-06)Described herein are systems and methods for telecommunications spectrum sharing between multiple heterogeneous users, which leverage a hybrid approach that includes both distributed spectrum sharing, spectrum-sensing, and use of geo-reference databases.
- Who’s winning in the game of attack and defend?Baker, Wade (Executive Media Pty Ltd, 2021-07-09)It’s often said that the ‘playing field’ of cyber security is heavily tilted in favour of attackers. Defenders must do everything perfectly, while attackers gain the upper hand if given the slightest opportunity. But is that an accurate depiction of the contest? Not exactly, according to recent research.